Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security configuration method and device, and storage medium

A technology of network security and configuration method, applied in the field of equipment and storage media, network security configuration method, can solve the problems of analysis error, missing configuration, incomplete analysis, etc., to avoid incompleteness and ensure the effect of security protection capability

Active Publication Date: 2021-11-30
HAIER DIGITAL TECHNOLOGY (QINGDAO) CO LTD +2
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing network security policy configuration method is based on manual analysis, and there may be incomplete analysis, analysis errors, manual configuration policy errors, missing configurations, etc., which will affect the security protection capabilities of business application systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security configuration method and device, and storage medium
  • Network security configuration method and device, and storage medium
  • Network security configuration method and device, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0060] When the business application system goes online, the operation and maintenance personnel need to manually analyze, identify which network devices, security software and hardware products need to be configured, and what network security policies need to be configured, and then log in to these network devices, security software and hardware product systems one by one to configure Network Security Policy.

[0061] The existing network security policy conf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network security configuration method and device, and a storage medium. The method comprises the following steps: determining a target object of a to-be-configured network security policy according to related information of a target service application system; determining a target network security policy corresponding to the target object according to the attribute information of the target object; selecting at least one target connection mode from a plurality of alternative connection modes according to the attribute information of the target object; and sending an operation instruction to the target object through the target connection mode, so that the target object sets the network security policy as the target security policy according to the operation instruction. According to the embodiment of the invention, the target object of the to-be-configured network security policy and the corresponding target network security policy can be automatically determined, and the operation instruction is issued through a proper connection mode, so the configuration of the target security policy of the target object is completed; the conditions of incomplete manual analysis, analysis errors, manual configuration strategy errors, configuration omission and the like are avoided, and the safety protection capability of the target service application system is ensured.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to a network security configuration method, equipment and storage medium. Background technique [0002] With the rapid development of the Internet era, the application of information technology has rapidly penetrated into various fields of social economy. People's work and life are increasingly dependent on computer and network technology. Network security issues have become the most basic problems faced by enterprises. [0003] When the business application system goes online, the operation and maintenance personnel need to manually analyze, identify which network devices, security software and hardware products need to be configured, and what network security policies need to be configured, and then log in to these network devices, security software and hardware product systems one by one to configure Network Security Policy. [0004] The existing network security p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/205H04L41/0213Y02D30/50
Inventor 张新硕刘焕焕胡越
Owner HAIER DIGITAL TECHNOLOGY (QINGDAO) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products